Git Product home page Git Product logo

faulty_honey_encryption's Introduction

faulty_honey_encryption

This repository is intended to indicate a possible vulnerability in honey encryption methodology

The honey encryption methodology is implemented in "encrypt.py", which is taken from repository: https://github.com/torjusbr/bip39-honey-encryption.

The honey encryption adds the zone of focus after decryption as well, where wrong keys can generate plausable plaintext.

The bash file is used to generate a small dataset, to perform a statistical or unsupervised learning analaysis. The dataset created by bash file is basically the correct key and random keys, with corresponding plaintexts. This dataset can be identified with txt files "plaintexter_*.txt".

In current scenario, the correct plaintext is sequence of words "arm, armed, army". We can think each individual word as chunk of plaintext.

Approach

In my statisitcal analysis, my basic hypothesis is that real world plaintexts are contextual, i.e. one part of the text can be somewhat related to the other part.

In this course, one could consider employing NLP approaches to determine similarity in some suitable notion.

For example, in the Glove Embedding view of the gathered dataset (which can adversary may find as well), projected onto 3D plane by PCA, looks like this:

image

One could employ an unsupervised clustering algorithm like Spectral Clustering to chunks to determine possible clusters as plaintext islands. Lets call these islands P. Here is a comparison:

image

Next, we excercise the main hypothesis to filter the possible plaintexts as the real texts, and thus bypassing the strength of honey encryption, by thresholding those chunks that are close less than a threshold. In this consideration, I employ DBSAN to perform density based clustering, to identify another set of islands. Lets call these islands P'. As shown in following figure, where three such islands have been identified. The plane shown is equidistant from the centroid of these clusters. image

Having identified P and P', the correct plaintext is x in P that has maximum chunks in P', which in our case is the original plaintext "arm, armed, army". Henceforth, this is the proof of context of honey encryption being blind to NLP.

References

Juels, Ari, and Thomas Ristenpart. "Honey encryption: Security beyond the brute-force bound." Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings 33. Springer Berlin Heidelberg, 2014.

faulty_honey_encryption's People

Contributors

superdianuj avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.